‘Robin Hood' Hackers Donate Stolen Money

A hacking group going by the name of Darkside has attempted to donate around $20,000 in stolen Bitcoin to charity the first known instance for cyber criminals. Despite having extorted millions of dollars from corporate victims, Darkside claim that they want to "make the world a better place".

In a message posted on the Dark Web, Darkside posted receipts for $10,000 in Bitcoin donations to two charities but Children International, says it won’t keep the money. 

The recipients of Darkside's generosity are Children International, which supports children, families and communities in South East Asia, Central America, Mexico and  the US. Also,The Water Project, which works to improve access to clean water in sub-Saharan Africa. Children International say they wont keep the money.

In the blog post on 13 October, the hackers claim they only target large profitable companies with their ransomware attacks and analysis of the crypto-currency market confirms they are actively extorting funds from victims. There is also evidence they may have links to high-profile attacks on companies including Travelex, driven into bankruptcy a crippling ransomware attack in January 2020.

The way the hackers paid the charities is also a possible cause for concern. Darkside used a US-based service called The Giving Block, which is used by 67 different non-profits from around the world including Save the Children, Rainforest Foundation. The Giving Block describes itself "the only non-profit specific solution for accepting crypto-currency donations". 

The Giving Block told the BBC it was not aware these donations were made by cyber-criminals, claiming that were still working to determine if these funds were actually stolen.  The company did not clarify if this means returning the stolen money to the criminals, or attempting to reimburse Darkside's victims.

It remains unclear whether that would mean returning the money to the hackers, or whether The Giving Block will give that money back to one of the victims of the Darkside hacker's ransomware attack.

ITPro:          Coindesk:        Forbes:        BornCity:     Web24

You Might Also Read:

A Charity Defrauded By Email:

 

« US Invests Big In Space Force Cyber Security
Webinar: How to enhance SOC efficiency for the AWS Cloud »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

GlobalSign

GlobalSign

GlobalSign is an identity services company providing cloud-based, PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery and community interactions.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

Sabasai

Sabasai

Sabasai specialises in all aspects of insider threat management from training and education to building security frameworks and insider threat programs to on-site risk & vulnerability assessments.

AimBrain

AimBrain

AimBrain tools detect and prevent fraud, faster and more accurately than ever before.

PureCyber

PureCyber

PureCyber (formerly Wolfberry Cyber) is an award-winning cyber security consultancy whose goal it is to make cyber security accessible, understandable, and affordable for any organisation.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.

Synergetika

Synergetika

Synergetika is a leading pure-play Privileged Access Management (PAM) consultancy and systems integrator.